Search

Your search keyword '"Varun Shukla"' showing total 59 results

Search Constraints

Start Over You searched for: Author "Varun Shukla" Remove constraint Author: "Varun Shukla"
59 results on '"Varun Shukla"'

Search Results

1. On Similarity Measures of Complex Picture Fuzzy Sets With Applications in the Field of Pattern Recognition

2. Boosting of fruit choices using machine learning-based pomological recommendation system

3. Progressive Pattern Interleaver with Multi-Carrier Modulation Schemes and Iterative Multi-User Detection in IoT 6G Environments with Multipath Channels

4. On Cohesive Fuzzy Sets, Operations and Properties with Applications in Electromagnetic Signals and Solar Activities

16. Is Chitosan Dental Dressing Better Than Cotton Gauze in Achieving Hemostasis in Patients on Antithrombotics?

17. Progressive pattern orthogonal interleaver set for interleave division multiple access based, non orthogonal multiple access schemes: Beyond 5G perspective

23. Contributors

27. Magnetically engineered sulfurized peat-based activated carbon for remediation of emerging pharmaceutical contaminants

28. Rare Case of Neuroendocrine Tumor of Common Bile Duct Identified With Somatostatin Receptor But Not With Glucose Transporter Imaging

29. A new authentication procedure for client-server applications using HMAC

34. A new one time password mechanism for client-server applications

35. A unique key sharing protocol among three users using non-commutative group for electronic health record system

36. A Secure Stop and Wait Communication Protocol for Disturbed Networks

37. A New Sequential Coding Method for Secure Data Communication

38. Profiling of emerging contaminants and antibiotic resistance in sewage treatment plants: An Indian perspective

39. A New One Time Password Generation Method for Financial Transactions with Randomness Analysis

42. Secure Wireless Communication Protocol: To Avoid Vulnerabilities in Shared Authentication

43. An Authenticated and Secure Electronic Health Record System

45. Three Party Key Sharing Protocol Using Polynomial Rings

47. A Secure Zero Knowledge Authentication Protocol for Wireless (Mobile) Ad-Hoc Networks

48. A Secure Wireless Communication Protocol using Diffie - Hellman Key Exchange

49. Tripartite Key Agreement Protocol using Conjugacy Problem in Braid Groups

50. A bit commitment signcryption protocol for wireless transport layer security (WTLS)

Catalog

Books, media, physical & digital resources